Really excited for this training! Having worked IT in the energy sector I know how many smaller coops have one or two IT guys so I can’t wait to see how we can improve our overall defense posture 😊
Thank you for checking out the video, Whenhen! I'm happy to hear you're excited for the course. And a big reason why I put the courses out on UA-cam is for the exact same reason you highlight - the majority of our ICS/OT environments out there simply don't have the resources they need to stay secure, but I hope this helps! Especially when ICS/OT systems get accidentally (or purposefully) connected to the Internet! Thanks again!
Thanks for checking out the course, Encyclopedia! And yes, you can have a copy of the slides for notes. Please just ping me on LinkedIn (linkedin.com/in/mikeholcomb).
Sir I really need your advice for my project. With all respect sir, I'd be really grateful for your help. We are 1st year Computer Science students and: We need to develop a tool that automatically checks the websites of equipment manufacturers (OEMs) and other relevant platforms for critical and high-severity vulnerabilities in both IT and OT equipment. When the tool finds such vulnerabilities, it should gather details and send an alert via email to the relevant people in the organization. Please suggest roadmap Sir
Feel free to ping me on LinkedIn CuriosityCraze. It'd be great to learn more about where you're going to school and your research project. Thanks for checking out the video!
You could look at ICS Advisory Project, While it doesn't directly scan websites, it provides a comprehensive database of known vulnerabilities that can be used to correlate with information extracted from OEM websites. But Mike is the man!!
Mr Mike you are number one in ICS/OT field in youtube , your channel will reach 1 milion subscribes soon 😍
I was just happy with 100 subscribers, Mahmoud! But thank you for saying - you are way too kind!
Really excited for this training! Having worked IT in the energy sector I know how many smaller coops have one or two IT guys so I can’t wait to see how we can improve our overall defense posture 😊
Thank you for checking out the video, Whenhen! I'm happy to hear you're excited for the course. And a big reason why I put the courses out on UA-cam is for the exact same reason you highlight - the majority of our ICS/OT environments out there simply don't have the resources they need to stay secure, but I hope this helps! Especially when ICS/OT systems get accidentally (or purposefully) connected to the Internet! Thanks again!
Love it, can't wait to finish the whole course!
Thanks for checking it out, HossamEldin! And I'm glad you loved it - Part 2 will be coming next Tuesday at 11AM EST!
Oooh! I am so into this. Can't wait.
Awesome to hear, Garey - thank you for checking it out! I hope you find it helpful!
Thank you so much Mike 👍
You're very welcome, Sam - thank you for taking the time to watch!
Great Mr:Mike and alot thanks of Your effort in the fieldbut can we have slides of This course ?
Thanks for checking out the course, Encyclopedia! And yes, you can have a copy of the slides for notes. Please just ping me on LinkedIn (linkedin.com/in/mikeholcomb).
thanks a lot Mr Mike .how to finish all course
I'll be uploading the additional parts starting next week, babdejil. I hope to have Parts 2 and 3 up next week. Stay tuned!
Good
I'm happy to hear you think so, Evans! Thank you for checking it out!
Sir I really need your advice for my project. With all respect sir, I'd be really grateful for your help. We are 1st year Computer Science students and:
We need to develop a tool that automatically checks the websites of equipment manufacturers (OEMs) and other relevant platforms for critical and high-severity vulnerabilities in both IT and OT equipment. When the tool finds such vulnerabilities, it should gather details and send an alert via email to the relevant people in the organization.
Please suggest roadmap Sir
Feel free to ping me on LinkedIn CuriosityCraze. It'd be great to learn more about where you're going to school and your research project. Thanks for checking out the video!
You could look at ICS Advisory Project, While it doesn't directly scan websites, it provides a comprehensive database of known vulnerabilities that can be used to correlate with information extracted from OEM websites. But Mike is the man!!